skip to main content
article

A taxonomy of DDoS attack and DDoS defense mechanisms

Published:01 April 2004Publication History
Skip Abstract Section

Abstract

Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem and the current solution space. The attack classification criteria was selected to highlight commonalities and important features of attack strategies, that define challenges and dictate the design of countermeasures. The defense taxonomy classifies the body of existing DDoS defenses based on their design decisions; it then shows how these decisions dictate the advantages and deficiencies of proposed solutions.

References

  1. D. G. Andersen. Mayday: Distributed filtering for internet services. In Proceedings of 4th Usenix Symposium on Internet Technologies and Systems, March 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris. Resilient Overlay Networks. In Proceedings of 18th ACM SOSP, October 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. T. Anderson, T. Roscoe, and D. Wetherall. Preventing internet denial-of-service with capabilities. In In Proceedings of HotNets II, November 2003.Google ScholarGoogle Scholar
  4. Arbor Networks. The Peakflow Platform. http://www.arbornetworks.com.Google ScholarGoogle Scholar
  5. T. Aura, P. Nikander, and J. Leiwo. DOS-Resistant Authentication with Client Puzzles. Lecture Notes in Computer Science, 2133, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Axelsson. Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Department of Computer Engineering, Chalmers University, March 2000.Google ScholarGoogle Scholar
  7. P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. In In Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, November 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. BBN Technologies. Applications that participate in their own defense. http://www.bbn.com/infosec/apod.html.Google ScholarGoogle Scholar
  9. BBN Technologies. Intrusion tolerance by unpredictability and adaptation. http://www.bbn.com/infosec/itua.html.Google ScholarGoogle Scholar
  10. S. Bellovin, M. Leech, and T. Taylor. ICMP Traceback Messages. Internet draft, work in progress, October 2001.Google ScholarGoogle Scholar
  11. D. J. Bernstein. Syn cookies. http://cr.yp.to/syncookies.html.Google ScholarGoogle Scholar
  12. CERT CC. CA-2001-19 "Code Red" Worm Exploiting Buffer Overflow In IIS Indexing Service DLL. http://www.cert.org/advisories/CA-2001-19.html.Google ScholarGoogle Scholar
  13. CERT CC. Code Red II. http://www.cert.org/incident_notes/IN-2001-09.html.Google ScholarGoogle Scholar
  14. CERT CC. Denial of Service Attacks. http://www.cert.org/tech_tips/denial_of_service.html.Google ScholarGoogle Scholar
  15. CERT CC. DoS using nameservers. http://www.cert.org/incident_notes/IN-2000-04.html.Google ScholarGoogle Scholar
  16. CERT CC. erkms and li0n worms. http://www.cert.org/incident_notes/IN-2001-03.html.Google ScholarGoogle Scholar
  17. CERT CC. Nimda worm. http://www.cert.org/advisories/CA-2001-26.html.Google ScholarGoogle Scholar
  18. CERT CC. Ramen worm. http://www.cert.org/incident_notes/IN-2001-01.html.Google ScholarGoogle Scholar
  19. CERT CC. Smurf attack. http://www.cert.org/advisories/CA-1998-01.html.Google ScholarGoogle Scholar
  20. CERT CC. TCP SYN flooding and IP spoofing attacks. http://www.cert.org/advisories/CA-1996-21.html.Google ScholarGoogle Scholar
  21. CERT CC. Trends in Denial of Service Attack Technology, October 2001. http://www.cert.org/archive/pdf/DoS_trends.pdf.Google ScholarGoogle Scholar
  22. Cisco. Strategies to protect against Distributed Denial of Service Attacks. http://www.cisco.com/warp/public/707/newsflash.html.Google ScholarGoogle Scholar
  23. Cs3. Inc. MANAnet DDoS White Papers. http://www.cs3-inc.com/mananet.html.Google ScholarGoogle Scholar
  24. T. Darmohray and R. Oliver. Hot spares for DDoS attacks. http://www.usenix.org/publications/login/2000-7/apropos.html.Google ScholarGoogle Scholar
  25. D. Dean, M. Franklin, and A. Stubblefield. An algebraic approach to IP Traceback. In Proceedings of the 2001 Network and Distributed System Security Symposium, February 2001.Google ScholarGoogle Scholar
  26. H. Debar, M. Dacier, and A. Wespi. Towards a taxonomy of intrusion-detection systems. In Computer Networks, volume 31(8), pages 805--822, April 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. Dittrich. The DoS Project's trinoo distributed denial of service attack tool. http://staff.washington.edu/dittrich/misc/trinoo.analysis.Google ScholarGoogle Scholar
  28. D. Dittrich. The Tribe Flood Network distributed denial of service attack tool. http://staff.washington.edu/dittrich/misc/tfn.analysis.txt.Google ScholarGoogle Scholar
  29. D. Dittrich, G. Weaver, S. Dietrich, and N. Long. The mstream distributed denial of service attack tool. http://staff.washington.edu/dittrich/misc/ mstream.analysis.txt.Google ScholarGoogle Scholar
  30. P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing. RFC 2827, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A. Garg and A. L. N. Reddy. Mitigation of DoS attacks through QoS Regulation. In Proceedings of IWQOS workshop, May 2002.Google ScholarGoogle ScholarCross RefCross Ref
  32. T. M. Gil and M. Poletto. MULTOPS: a data-structure for bandwidth attack detection. In Proceedings of 10th Usenix Security Symposium, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. K. Hafner and J. Markoff. Cyberpunk: Outlaws and hackers on the computer frontier. Simon & Schuster, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. G. Hardin. The Tragedy of the Commons. Science, 162(1968):1243--1248, 1968.Google ScholarGoogle Scholar
  35. J. D. Howard. An analysis of security incidents on the Internet. PhD thesis, Carnegie Mellon University, August 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. J. D. Howard and T. A. Longstaff. A common language for computer security incidents.Google ScholarGoogle Scholar
  37. A. Hussain, J. Heidemann, and C. Papadopoulos. A Framework for Classifying Denial of Service Attack. In Proceedings of SIGCOMM 2003, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Information Sciences Institute. Dynabone. http://www.isi.edu/dynabone/.Google ScholarGoogle Scholar
  39. J. Ioannidis and S. M. Bellovin. Pushback: Router-Based Defense Against DDoS Attacks. In Proceedings of NDSS, February 2002.Google ScholarGoogle Scholar
  40. A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of the 1999 Networks and distributed system security symposium, March 1999.Google ScholarGoogle Scholar
  41. F. Kargl, J. Maier, and M. Weber. Protecting web servers from distributed denial of service attacks. In Proceedings of 10th International World Wide Web Conference, May 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. A. D. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure Overlay Services. In Proceedings of SIGCOMM 2002, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. F. Lau, S. H. Rubin, M. H. Smith, and L. Trajkovic. Distributed Denial of Service Attacks. In IEEE International Conference on Systems, Man, and Cybernetics, pages 2275--2280, Nashville, TN, USA, October 2000.Google ScholarGoogle Scholar
  44. J. Leiwo, P. Nikander, and T. Aura. Towards network denial of service resistant protocols. In Proceedings of the 15th International Information Security Conference, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang. SAVE: Source Address Validity Enforcement Protocol. In Proceedings of INFOCOM 2002, June 2002. to appear.Google ScholarGoogle Scholar
  46. R. Mahajan, S. Bellovin, S. Floyd, V. Paxson, and S. Shenker. Controlling high bandwidth aggregates in the network. ACM Computer Communications Review, 32(3), July 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. G. R. Malan, D. Watson, F. Jahanian, and P. Howell. Transport and Application Protocol Scrubbing. In Proceedings of INFOCOM 2000, pages 1381--1390, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  48. Mazu Networks. Mazu Technical White Papers. http://www.mazunetworks.com/white_papers/.Google ScholarGoogle Scholar
  49. McAfee. Personal Firewall. http://www.mcafee.com/myapps/firewall/ov_firewall.aspGoogle ScholarGoogle Scholar
  50. C. Meadows. A formal framework and evaluation method for network denial of service. In Proceedings of the 12th IEEE Computer Security Foundations Workshop, June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. J. Mirkovic. D-WARD: Source-End Defense Against Distributed Denial-of-Service Attacks. PhD thesis, University of California Los Angeles, August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. J. Mirkovic, G. Prier, and P. Reiher. Attacking DDoS at the Source. In Proceedings of the ICNP 2002, November 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. D. Moore. The spread of the code red worm (crv2). http://www.caida.org/analysis/security/codered/coderedv2_analysis.xml.Google ScholarGoogle Scholar
  54. D. Moore, G. Voelker, and S. Savage. Inferring Internet Denial-of-Service Activity. In Proceedings of the 2001 USENIX Security Symposium, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. R. Naraine. Massive DDoS Attack Hit DNS Root Servers, October 2002. http://www.esecurityplanet.com/trends/article/0,10751_1486981,00.html.Google ScholarGoogle Scholar
  56. National Infrastructure Protection Center. Advisory 01-014: New Scanning Activity (with W32-Leave.worm) Exploiting SubSeven Victims, June 2001. http://www.nipc.gov/warnings/advisories/2001/01-014.htm.Google ScholarGoogle Scholar
  57. E. O'Brien. NetBouncer : A practical client legitimacy-based DDoS defense via ingress filtering. http://www.nai.com/research/nailabs/development-solutions/netbouncer.asp.Google ScholarGoogle Scholar
  58. K. Park and H. Lee. On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In Proceedings of ACM SIGCOMM 2001, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. V. Paxson. An analysis of using reflectors for distributed denial-of-service attacks. ACM Computer Communications Review (CCR), 31(3), July 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. V. Razmov. Denial of Service Attacks and How to Defend Against Them. http://www.cs.washington.edu/homes/valentin/ papers/DoSAttacks.pdf.Google ScholarGoogle Scholar
  61. SANS Institute. NAPTHA: A new type of Denial of Service Attack, December 2000. http://rr.sans.org/threats/naptha2.php.Google ScholarGoogle Scholar
  62. S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical Network Support for IP Traceback. In Proceedings of ACM SIGCOMM 2000, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. C. Schuba, I. Krsul, M. Kuhn, G. Spafford, A. Sundaram, and D. Zamboni. Analysis of a denial of service attack on TCP. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. S. Dietrich, N. Long, and D. Dittrich. An Analysis of the "shaft" distributed denial of service tool. In Proceedings of LISA 2000, 2000. http://www.adelphi.edu/ spock/shaft-lisa2000.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer. Hash-Based IP Traceback. In Proceedings of ACM SIGCOMM 2001, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. D. X. Song and A. Perrig. Advanced and authenticated marking schemes for IP Traceback. In Proceedings of IEEE Infocom 2001, 2001.Google ScholarGoogle Scholar
  67. Sourcefire. Snort: The Open Source Network Intrusion Detection System.Google ScholarGoogle Scholar
  68. O. Spatscheck and L. L. Petersen. Defending Against Denial of Service Attacks in Scout. In Proceedings of the 3rd Symposium on Operating Systems Design and Implementation, February 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. S. Staniford, J. Hoagland, and J. McAlerney. Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1/2), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. S. Staniford, V. Paxson, and N. Weaver. How to own the internet in your spare time, 2002. In Proceedings of the 11th USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Tripwire. Tripwire for servers. http://www.tripwire.com/products/servers/.Google ScholarGoogle Scholar
  72. N. Weaver. Warhol Worm. http://www.cs.berkeley.edu/nweaver/worms.pdf.Google ScholarGoogle Scholar
  73. M. Williamson. Throttling viruses: Restricting propagation to defeat malicious mobile code. In 18th Annual Computer Security Applications Conference, December 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. J. Yan, S. Early, and R. Anderson. The XenoService - A Distributed Defeat for Distributed Denial of Service. In Proceedings of ISW 2000, Oct. 2000.Google ScholarGoogle Scholar
  75. V. Yegneswaran, P. Barford, and J. Ullrich. Internet intrusions: Global characteristics and prevalence. In In Proceedings of the 2003 ACM SIGMETRICS International conference on Measurement and Modeling of Computer Systems, pages 138--147, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Y. L. Zheng and J. Leiwo. A Method to Implement a Denial of Service Protection Base. In Information Security and Privacy, volume 1270 of LNCS, pages 90--101, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGCOMM Computer Communication Review
    ACM SIGCOMM Computer Communication Review  Volume 34, Issue 2
    April 2004
    151 pages
    ISSN:0146-4833
    DOI:10.1145/997150
    Issue’s Table of Contents

    Copyright © 2004 Authors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 1 April 2004

    Check for updates

    Qualifiers

    • article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader